


default search action
18th CCNC 2021: Las Vegas, NV, USA
- 18th IEEE Annual Consumer Communications & Networking Conference, CCNC 2021, Las Vegas, NV, USA, January 9-12, 2021. IEEE 2021, ISBN 978-1-7281-9794-4

- Diego A. B. Moreira

, Humberto P. Marques, Wanderson L. Costa, Joaquim Celestino Jr., Rafael L. Gomes
, Michele Nogueira:
Anomaly Detection in Smart Environments using AI over Fog and Cloud Computing. 1-2 - Taehyun Kim, JooSung Park:

Dynamic Dual Quantization-Domain Self-Corrected LDPC Decoder. 1-2 - Yang Chen, Nami Ashizawa

, Seanglidet Yean, Chai Kiat Yeo
, Naoto Yanai
:
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection. 1-6 - Yukito Onodera, Yoshiaki Inoue, Daisuke Hisano, Yu Nakayama:

Real-Time and Energy-Efficient Inference at GPU-Based Network Edge using PON. 1-6 - T. Tolga Sari

, Gökhan Seçinti:
Chain RTS/CTS Scheme for Aerial Multihop Communications. 1-2 - Shoma Nishibori, Yukihiro Tadokoro, Tutomu Murase:

Prioritized Periodical Communication with Timing Reservation Multiple Access for Autonomous Distributed Mobile Sensor Networks. 1-2 - Josh Robinson, Scott Kuzdeba:

RiftNet: Radio Frequency Classification for Large Populations. 1-6 - Xiucheng Wang

, Hongzhi Guo:
Mobility-Aware Computation Offloading for Swarm Robotics using Deep Reinforcement Learning. 1-4 - Suman Kumar

, Kazi Amanul Islam Siddiqui, Mukesh Kumar:
Skin-Health Monitoring system using a Wireless Body Area Network. 1-7 - Yuqi Luo

, Jiang Liu
, Shigeru Shimamoto:
Wearable Air-Writing Recognition System employing Dynamic Time Warping. 1-6 - Sripada Kadambar, Anirudh Reddy Godala, Ashok Kumar Reddy Chavva, Vaishal Sujal Tijoriwala:

Learning Based CSI Feedback Prediction for 5G NR. 1-6 - Xiwen Chen

, Huayu Li, Junsuo Qu, Abolfazl Razi:
Boosting Belief Propagation for LDPC Codes with Deep Convolutional Neural Network Predictors. 1-6 - Earl Tankard, Christopher Flowers, Jiang Li, Danda B. Rawat

:
Toward Bias Analysis Using Tweets and Natural Language Processing. 1-3 - Iran Ribeiro

, Lucas Castanheira, Alberto Schaeffer-Filho, Weverton Cordeiro, Vinícius F. S. Mota:
Mobility and Community Detection Based on Topics of Interest. 1-6 - Anouar Rkhami, Yassine Hadjadj-Aoul, Abdelkader Outtagarts:

Learn to improve: A novel deep reinforcement learning approach for beyond 5G network slicing. 1-6 - Muhammad Reazul Haque

, Saw Chin Tan, Zulfadzli Yusoff
, Kashif Nisar, Ching Kwang Lee, B. S. Chowdhry, Sameer Ali, Shuaib K. Memon, Rizaludin Kaspin:
SDN Architecture for UAVs and EVs using Satellite: A Hypothetical Model and New Challenges for Future. 1-6 - Xueyuan Wang, Mustafa Cenk Gursoy:

Coverage in Networks with Hybrid Terahertz, Millimeter Wave, and Microwave Transmissions. 1-4 - Christian Werner, Robert Kraneis:

UNISON: A Novel System for Ultra-Low Latency Audio Streaming Over the Internet. 1-4 - Ryohei Banno, Koki Ohsawa, Yusuke Kitagawa, Takumu Takada, Toshinori Yoshizawa:

Measuring Performance of MQTT v5.0 Brokers with MQTTLoader. 1-2 - Umair Mohammad, Sameh Sorour, Mohamed Hefeida:

Optimal Task Allocation for Mobile Edge Learning with Global Training Time Constraints. 1-4 - Praneet Singh

, Jishnu Jaykumar P, Akhil Pankaj, Reshmi Mitra:
Edge-Detect: Edge-Centric Network Intrusion Detection using Deep Neural Network. 1-6 - Gianluca Perna, Dena Markudova, Martino Trevisan, Paolo Garza, Michela Meo

, Maurizio M. Munafò, Giovanna Carofiglio:
Online Classification of RTC Traffic. 1-6 - Sridharan Natarajan, Santhosh Mohan:

A Supervised Learning Approach for Reducing Latency during Context Switchover in 5G MEC. 1-2 - Sayed Amir Hoseini

, Ayub Bokani
, Jahan Hassan
, Shavbo Salehi, Salil S. Kanhere
:
Energy and Service-Priority aware Trajectory Design for UAV-BSs using Double Q-Learning. 1-4 - Barbara Guidi, Andrea Michienzi

, Laura Ricci:
Data Persistence in Decentralized Social Applications: The IPFS approach. 1-4 - Honami Furukawa, Aohan Li

, Yozo Shoji
, Yoshito Watanabe
, Song-Ju Kim, Koya Sato
, Yiannis Andreopoulos, Mikio Hasegawa
:
A Channel Selection Algorithm Using Reinforcement Learning for Mobile Devices in Massive IoT System. 1-2 - Vinay Kumar Shrivastava, Avijit Manna, Kalyan Dhulipudi:

Energy Efficient and Performance Optimized Measurements for 5G and Beyond. 1-6 - Sangkyu Baek, Daegyun Kim:

Impact Analysis of Receiver Sensitivity and Censored Data to NLoS Channel Models in Millimeter Wave Frequency Bands. 1-6 - Rameez Asif

, Kinan Ghanem:
AI Secured SD-WAN Architecture as a Latency Critical IoT Enabler for 5G and Beyond Communications. 1-6 - Andreas Ingo Grohmann, Alexander Kropp, Christopher Lehmann, Ievgenii Tsokalo, Frank H. P. Fitzek

:
Catch Me If You Can: Demonstration of Publicly Remote Controlled Robots. 1-2 - Ahmed Ammar, Matthew C. Valenti, Daryl Reynolds:

Relay Selection with Wireless Energy Transfer in mmWave Networks. 1-2 - Felix O. Olowononi, Danda B. Rawat

, Chunmei Liu:
Federated Learning with Differential Privacy for Resilient Vehicular Cyber Physical Systems. 1-5 - Kevin Gatimu, Ben Lee:

qMDP: DASH Adaptation using Queueing Theory within a Markov Decision Process. 1-6 - Xiao Lin, Jiangnan Zou, Shengnan Yue, Weiqiang Sun, Weisheng Hu:

Inter-Datacenter Multicast with Store-and-Forward in Software-Defined Optical Networks. 1-7 - Çaglar Karahan, Berk Canberk

:
An Intelligent 3D Placement Methodology for Drone Networks. 1-6 - Ombretta Gaggi, Veronica Pederiva:

WCAG4All, a tool for making web accessibility rules accessible. 1-6 - Pascal Urien

:
A New IoT Trust Model Based on TLS-SE and TLS-IM Secure Elements: A Blockchain Use Case. 1-2 - Hyunmin Seo, Hyunsoo Kim, Taehyung Kim, Daesik Hong:

Accurate Positioning Using Beamforming. 1-4 - Zaw Htike, Azril Haniz

, Takeshi Matsumura, Fumihide Kojima:
An Efficient Group-Based Mobility Management Mechanism for Cellular M2M Networks. 1-7 - Sanwal Zeb

, Arsalan Ahmad
, Ashfaq Ahmed, Andrea Bianco:
Power Aware Data Center Placement in WDM Optical Networks. 1-6 - Mamoru Okumura, Kaga Tomoki, Eiji Okamoto, Tetsuya Yamamoto:

Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security. 1-2 - Aaron D. Likens, Spyridon Mastorakis, Andreas Skiadopoulos

, Jenny A. Kent, Md Washik Al Azad, Nick Stergiou
:
Irregular Metronomes as Assistive Devices to Promote Healthy Gait Patterns. 1-7 - Ganesh Prasad, Deepak Mishra

, Rabul Hussain Laskar:
Optimal New Node Insertion for Strong Minimum Energy Topology in IoT Networks. 1-4 - Cristiano Aguzzi, Lorenzo Gigli

, Luca Sciullo, Angelo Trotta, Federica Zonzini
, Luca De Marchi, Marco Di Felice, Alessandro Marzani
, Tullio Salmon Cinotti
:
MODRON: A Scalable and Interoperable Web of Things Platform for Structural Health Monitoring. 1-7 - Hong Lin, Rita Tse, Su-Kit Tang

, Yanbing Chen, Wei Ke
, Giovanni Pau
:
Near-Realtime Face Mask Wearing Recognition Based on Deep Learning. 1-7 - Paul Gorday, Nurgün Erdöl, Hanqi Zhuang:

Complex Autoencoder Approach to Constant Envelope Waveform Coding. 1-4 - Barbara Guidi, Andrea Michienzi

, Laura Ricci, Vincenzo Ambriola:
Analysing Dunbar Circles in Facebook Groups. 1-6 - Pablo Gil Pereira, Thorsten Herfet:

Reducing FEC-Complexity in Cross-Layer Predictable Data Communication. 1-2 - Yangyang Tao, Junxiu Zhou, Shucheng Yu

:
Efficient Parameter Aggregation in Federated Learning with Hybrid Convergecast. 1-6 - Aidmar Wainakh, Till Müßig, Tim Grube, Max Mühlhäuser:

Label Leakage from Gradients in Distributed Machine Learning. 1-4 - Melvin Bender, Erkin Kirdan, Marc-Oliver Pahl

, Georg Carle:
Open-Source MQTT Evaluation. 1-4 - Shuhei Isomura, Taiki Yoshikawa, Hijiri Komura, Shota Kubota, Chihiro Nishiwaki, Katsuhiro Naito:

Prototyping evaluation of CYPHONIC: Overlay network technology for Cyber-Physical communication. 1-2 - Xiang Wu, Zhu Jin

, Wen-Kang Jia, Xiaoning Shi:
Aggregating Multiple Small-Data Frames using Arithmetic Encoding in P4 Switches. 1-6 - Jie Ding

, Mingjie Feng, Mahyar Nemati
, Jinho Choi
:
Performance Analysis of Massive MIMO Assisted Semi-Grant-Free Random Access. 1-7 - Chanaka Samarathunga, Mohamed Abouelseoud, Kazuyuki Sakoda, Morteza Hashemi

:
On the Benefits of Multi-Hop Communication for Indoor 60 GHz Wireless Networks. 1-4 - Raiful Hasan, Ragib Hasan

:
Towards a Threat Model and Security Analysis of Video Conferencing Systems. 1-4 - Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage

, Mika Ylianttila:
Performance Analysis of Softwarized Local Mobile Networks. 1-2 - Patrick Pirri, Claus Pahl

, Nabil El Ioini, Hamid R. Barzegar:
Towards Cooperative Maneuvering Simulation: Tools and Architecture. 1-6 - Takuto Jikyo, Tomio Kamada

, Chikara Ohta, Takaharu Yaguchi
, Kenji Oyama, Takenao Ohkawa, Ryo Nishide:
Error Factor Analysis of DNN-based Fingerprinting Localization through Virtual Space. 1-4 - Floriano De Rango, Nicola Cordeschi, Francesco Ritacco:

Applying Q-learning approach to CSMA Scheme to dynamically tune the contention probability. 1-4 - Xin Qi, Toshio Sato

, Keping Yu
, Zheng Wen, San Hlaing Myint, Yutaka Katsuyama, Kiyohito Tokuda, Takuro Sato:
Congestion-Aware Suspicious Object Detection System Using Information-Centric Networking. 1-6 - Alexandros G. Fragkiadakis:

An IoT-based Platform for Supply Chain Monitoring. 1-4 - Aashma Uprety

, Danda B. Rawat
, Jiang Li:
Privacy Preserving Misbehavior Detection in IoV Using Federated Machine Learning. 1-6 - Asif Hasnain, Holger Karl:

Learning Flow Scheduling. 1-6 - Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani:

DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding. 1-7 - Nisita Weerasinghe, Tharaka Mawanane Hewa, Maheshi Dissanayake, Mika Ylianttila, Madhusanka Liyanage

:
Blockchain-based Roaming and Offload Service Platform for Local 5G Operators. 1-6 - Mohamed Baza

, Ramy Amer
, Amar A. Rasheed, Gautam Srivastava, Mohamed Mahmoud, Waleed Alasmary:
A Blockchain-Based Energy Trading Scheme for Electric Vehicles. 1-7 - Changseong Kim, Soyeon Kim, Sang-Hoon Lee, Soochang Park, Taehun Yang

:
Cyber-Physical Individual Monitoring in Indoor Internet -of- Things Systems With Edge Intelligence. 1-2 - Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki:

Optimal Server Selection Scheme With Optimistic Synchronization for Delay Sensitive Services. 1-4 - Marcus de V. D. da Silva, Alexandre Rocha, Rafael L. Gomes

, Michele Nogueira:
Lightweight Data Compression for Low Energy Consumption in Industrial Internet of Things. 1-2 - Daiki Maruyama, Kenji Kanai, Jiro Katto

:
Performance Evaluations of Channel Estimation Using Deep-learning Based Super-resolution. 1-6 - Sweta Jaiswal, Jamsheed Manja Ppallan

, Karthikeyan Arunachalam
, Shiva Souhith Gantha
:
Computational and Location Aware Middleware to Enable Edge Computing in Mobile Devices. 1-7 - Moez Altayeb

, Marco Zennaro, Ermanno Pietrosemoli
, Pietro Manzoni:
TurboLoRa: Enhancing LoRaWAN Data Rate via Device Synchronization. 1-4 - Ghada Alsuhli

, Hassan A. Ismail, Kareem A. Alansary, Mahmoud Rumman, Mostafa Mohamed, Karim G. Seddik
:
Deep Reinforcement Learning-based CIO and Energy Control for LTE Mobility Load Balancing. 1-6 - Marco Furini

:
Automatic Music Playlist Generation Based on Music-Programming of FM Radios. 1-4 - Genta Ishii, Megumi Saito, Zhenni Pan, Jiang Liu, Shigeru Shimamoto:

Wireless Power Transmission Scheme Employing Phase Control for WSN. 1-4 - Arifa Ahmed

, Deepak Mishra
, Ganesh Prasad, Krishna Lal Baishnab:
Performance Analysis of Multi-Antenna CR System With Beamforming Under Various Traffic Scenarios. 1-6 - Albert Aninagyei Ofori, Hongzhi Guo:

MagBB: Wireless Charging for Batteryless Sensors Using Magnetic Blind Beamforming. 1-8 - Taichi Miya, Kohta Ohshima, Yoshiaki Kitaguchi, Katsunori Yamaoka

:
Experimental Analysis of Communication Relaying Delay in Low-Energy Ad-hoc Networks. 1-2 - Abdulhamid A. Adebayo, Danda B. Rawat

:
Cyber Deception for Wireless Network Virtualization Using Stackelberg Game Theory. 1-6 - Taehyun Kim

, JooSung Park:
Logistic Regression for LDPC Decoding Failure Prediction. 1-6 - Thomas Setzler, Xenia Mountrouidou:

IoT Metrics and Automation for Security Evaluation. 1-4 - Samikkannu Rajkumar

, Dushantha Nalin K. Jayakody, Zheng Chang:
A Hybrid NOMA-PLNC Wireless Relay Scheme. 1-2 - Naveen Kumar, Karthikeyan Subramaniam, Karthikeyan Narayanan, Nikhil Kommineni:

A Novel Power Efficient CP Block Selection Procedure for Delay- Tolerant Services to Handle CP Outages in 5G and Beyond. 1-4 - Siavash Barqi Janiar, Vahid Pourahmadi:

Deep-Reinforcement Learning for Fair Distributed Dynamic Spectrum Access in Wireless Networks. 1-4 - Naveen Naik Sapavath

, Danda B. Rawat
:
Artificial Intelligence Assisted Wireless Resource Allocation for Wireless Network Virtualization. 1-6 - Hibiki Sekine, Kenji Kanai, Jiro Katto

, Hidehiro Kanemitsu, Hidenori Nakazato:
IoT-centric Service Function ChainingOrchestration and its Performance Validation. 1-4 - Taesoo Jun, Minkyong Kim, Jeesun Kim, Deokjin Kim, Kwanghyuk Kim, Dayeon Kang:

Facilitating Integration of IoT Ecosystems via Universal Cloud Interface. 1-4 - Zhu Jin

, Xiang Wu, Wen-Kang Jia, Xiaoning Shi:
Fractional-N SVRF Forwarding Algorithm for Low Port-Density Packet Forwarding Engines. 1-5 - Kousuke Okumura, Tutomu Murase:

User Cooperative Mobility for the High Throughput of Target Flows in Multiple Ad-Hoc Networks. 1-8 - Fabio Pittarello:

Designing Interactive Systems for Seniors: An Educational Experience. 1-6 - Babu R. Dawadi, Danda B. Rawat

, Shashidhar R. Joshi, Pietro Manzoni:
ANFIS based Classification Model for Network Device Migration towards SoDIP6 Networks. 1-6 - Xiaomin Ma, Shengli Ding, Chloe Rae Busse, Ivan Samuel Esley:

Multi-layer QoS Analysis of IEEE 802.11bd Based VANET for Safety Applications. 1-6 - Yuya Arakawa, Kazuki Nishikori, Keiichi Mizutani, Takeshi Matsumura, Hiroshi Harada

:
An Initial Study of Dynamic-Duplex Cellular System on 5G NR Downlink in High SHF Band. 1-2 - João Paulo de Brito Gonçalves, Henrique Cesar Carvalho de Resende, Esteban Municio, Rodolfo da Silva Villaça, Johann M. Márquez-Barja

:
Securing E-Health Networks by applying Network Slicing and Blockchain Techniques. 1-2 - Siwei Zhang, Robert Pöhlmann, Emanuel Staudinger

, Armin Dammann
:
Assembling a Swarm Navigation System: Communication, Localization, Sensing and Control. 1-9 - Pragya Swami

, Vimal Bhatia
:
Impact of Distance on Outage Probability in IRS-NOMA for Beyond 5G Networks. 1-2 - Yusuke Aoyama, Takeru Kuroiwa, Noriyuki Kushiro:

Executable Test Case Generation from Specifications Written in Natural Language and Test Execution Environment. 1-6 - Scott Kuzdeba, Josh Robinson, Joseph M. Carmack:

Transfer Learning with Radio Frequency Signals. 1-9 - Nouman Bashir, Saadi Boudjit, Mohand Yazid Saidi:

A Distributed Anticipatory Life- Enhancing Recovery Approach for Unmanned Aerial Vehicular Networks. 1-7 - Ahmed Aboud

, Haifa Touati
, Brahim Hnich
:
Handover Optimization for VANET in 5G Networks. 1-2 - Yanyan Li, Sara Kim, Eric Sy:

A Survey on Amazon Alexa Attack Surfaces. 1-7 - Antonella Carbonaro

:
Modelling Educational Resources to Support Accessibility Requirements. 1-5 - Bashar Chreim, Jad Nassar, Carol Habib:

Regression-based Data Reduction Algorithm for Smart Grids. 1-2 - Adita Kulkarni, Anand Seetharam:

QoE-aware Video Streaming in Heterogeneous Cellular Networks. 1-2 - Edward Longman

, Oktay Cetinkaya
, Mohammed El-Hajjar, Geoff V. Merrett:
Wake-up Radio-enabled Intermittently-powered Devices for Mesh Networking: A Power Analysis. 1-6 - Mahzabeen Emu, Salimur Choudhury:

Towards 6G Networks: Ensemble Deep Learning Empowered VNF Deployment for IoT Services. 1-4 - Wanqing Tu

:
A Seamless and Efficient Transition Algorithm For Aerial Drone Multicasting. 1-6 - Alexander Kropp, Mario Schwalbe, Ievgenii A. Tsokalo, Martin Süßkraut, Robert-Steve Schmoll, Frank H. P. Fitzek

:
Reliable Control for Robotics - Hardware Resilience Powered by Software. 1-2 - Harishwar Reddy Bapathu, Siddhartha S. Borkotoky:

The LoRa Modulation Over Rapidly-Varying Channels: Are the Higher Spreading Factors Necessarily More Robust? 1-4 - Sara A. Attalla, Karim G. Seddik

, Amr A. El-Sherif, Tamer A. ElBatt:
A Reinforcement Learning Approach to ARQ Feedback-based Multiple Access for Cognitive Radio Networks. 1-5 - Kamalani Aiyar, Malka N. Halgamuge

, Azeem Mohammad:
Probability Distribution Model to Analyze the Trade-off between Scalability and Security of Sharding-Based Blockchain Networks. 1-6 - Kübra Duran, Bahtiyar Karanlik, Berk Canberk

:
AI-Driven Partial Topology Discovery Algorithm for Broadband Networks. 1-6 - Zakaria Laaroussi, Oscar Novo

:
A Performance Analysis of the Security Communication in CoAP and MQTT. 1-6 - Yang Yang, Yulin Hu

, Mustafa Cenk Gursoy:
Deep Reinforcement Learning and Optimization Based Green Mobile Edge Computing. 1-2 - João Francisco Nunes Pinheiro, Esteban Municio, Christiaan Leysen, Johann M. Márquez-Barja

:
ORCHESTRA 2.0: Enhancing a multi-access solution to address 5G challenges. 1-4 - Babatunde Ojetunde

, Kenta Suzuki, Kazuto Yano, Yoshinori Suzuki:
Network Scan Failure and Delay Estimation of IoT Wireless Equipment using Scenario Detection Technique. 1-8 - Yi Li, Jing Lin, Kaiqi Xiong:

An Adversarial Attack Defending System for Securing In-Vehicle Networks. 1-6 - Soyeon Kim, Soochang Park, Sang-Hoon Lee, Taehun Yang

:
Smart Parking with Learning-aided User Activity Sensing Based on Edge Computing. 1-2 - Neelakantan Nurani Krishnan, Ivan Seskar, Narayan B. Mandayam:

On Enhancing Throughput Performance of Wi-Fi Networks: Combining Coordinated AP and mmWave Bands. 1-4 - Amjad Yousef Majid

, Casper van der Horst, Tomas van Rietbergen, David JohannesZwart, R. Venkatesha Prasad
:
Lightweight Audio Source Localization for Swarm Robots. 1-6 - Yu Tsukamoto, Haruhisa Hirayama, Seung Il Moon, Shinobu Nanba, Hiroyuki Shinbo:

Feedback Control for Adaptive Function Placement in Uncertain Traffic Changes on an Advanced 5G System. 1-6 - Julius Flohr, Erwin P. Rathgeb:

Reducing End-to-End Delays in WebRTC using the FSE-NG Algorithm for SCReAM Congestion Control. 1-4 - Abu Asaduzzaman, Abhignan Telakapalli, Fadi N. Sibai

:
Smart Disaster Management Using Software-Defined Unmanned Aerial Systems. 1-2 - Mark Vaszary, Andreas Slovacek, Yanyan Zhuang, Sang-Yoon Chang:

Securing Tire Pressure Monitoring System for Vehicular Privacy. 1-6 - Marco Furini

, Silvia Mirri
, Manuela Montangero, Margherita Pecorelli, Catia Prandi
:
On using Conversational Interfaces to Improve the Accessibility of a University Campus. 1-6 - Christos-Alexandros Sarros

, Vassilis Demiroglou
, Vassilis Tsaoussidis
:
Intermittently-connected IoT devices: Experiments with an NDN-DTN architecture. 1-9 - Pejman Ghasemzadeh, Michael Hempel

, Hamid Sharif:
A Novel High-Accuracy Low-Execution Time Machine Learning- Driven Approach to Automatic Modulation Classification. 1-6 - Naoki Akaba, Yi-Han Chiang, Hai Lin:

Data-Driven Phase Noise Mitigation in OFDM Systems. 1-4 - Ronald Doku

, Danda B. Rawat
:
Mitigating Data Poisoning Attacks On a Federated Learning-Edge Computing Network. 1-6 - Mangqing Guo, Mustafa Cenk Gursoy:

Performance Analysis of Cell-Free Massive MIMO Systems with Massive Connectivity. 1-6 - Adel Bouridah, Ilhem Fajjari, Nadjib Aitsaadi, Hacene Belhadef:

Optimized Scalable SFC Traffic Steering Scheme for Cloud Native based Applications. 1-6 - Robby Wayong, Ryota Okumura, Keiichi Mizutani, Hiroshi Harada

:
A Routing Protocol toward Reliable Mobile Communication in Wi-SUN FAN. 1-6 - Hideaki Oguni, Kazuyuki Shudo:

Addressing the Heterogeneity of A Wide Area Network for DNNs. 1-6 - Gang Toe Lee, Seung Beom Seo, Wha Sook Jeon:

Indoor Localization by Kalman Filter based Combining of UWB-Positioning and PDR. 1-6 - Sivanandham Sivasankar, Rajesh Challa:

Closed Loop Paging Optimization for Efficient Mobility Management. 1-7 - Ayoub Ben-Ameur, Andrea Araldo, Francesco Bronzino

:
On the Deployability of Augmented Reality Using Embedded Edge Devices. 1-6 - Shadi Sadeghpour

, Natalija Vlajic, Pooria Madani
, Dusan Stevanovic:
Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation. 1-9 - Marco Furini

:
Automatic and Smart Content Transformation of Video Lectures. 1-6 - Shunnosuke Kotera, Bo Yin, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura, Hirantha Abeysekera:

Latency-Aware Fair Scheduling for Spatial Reuse in WLANs: A Lyapunov Optimization Approach. 1-6 - Liang Chen, Ruisi Wu, Wen-Kang Jia:

Exploring the Optimal Intercept Access Point Placement Problem in Software-Defined Networks. 1-6 - Surender Redhu, Amrendra P. Singh, Rajesh M. Hegde, Baltasar Beferull-Lozano:

A Cluster based Sensor-Selection Scheme for Energy-Efficient Agriculture Sensor Networks. 1-4 - Hemant Kumar Narsani, Prasanna Raut

, Kapal Dev
, Keshav Singh, Chih-Peng Li:
Interference Limited Network for Factory Automation with Multiple Packets Transmissions. 1-6 - Andres F. Reyes, Edgar Camilo Camacho, Armando Mateus, Juan M. Calderón:

LSTM based brain-machine interface tool for text generation through eyes blinking detection. 1-6 - Naveera Salam, Muhammad Kumail Abbas, Mukesh Kumar Maheshwari

, B. S. Chowdhry, Kashif Nisar:
Future Mobile Technology: Channel Access Mechanism for LTE-LAA using Deep Learning. 1-5 - Shobhit Mathur, Pritam Nikam, Harshita Patidar, Rohan Bapusaheb Gaikwad, Preeti Narayan Nayak:

Machine-Learning directed Article Detection on the Web using DOM and text-based features. 1-5 - Thi Ha Ly Dinh, Megumi Kaneko

, Keisuke Wakao, Kenichi Kawamura, Takatsune Moriyama, Hirantha Abeysekera, Yasushi Takatori:
Deep Reinforcement Learning-based User Association in Sub6GHz/mmWave Integrated Networks. 1-7 - Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, Preetam Ghosh

:
Adaptive Motif-based Topology Control in Mobile Software Defined Wireless Sensor Networks. 1-6 - Saahil Claypool, Jae Chung, Mark Claypool:

Measurements Comparing TCP Cubic and TCP BBR over a Satellite Network. 1-4 - Kei Fujimoto

, Kenichi Matsui
, Masayuki Akutsu:
KBP: Kernel Enhancements for Low-Latency Networking without Application Customization in Virtual Server. 1-7 - Simon Khan, Cooper Fraser, Daqing Hou, Mahesh K. Banavar, Stephanie Schuckers:

Authenticating Facebook Users Based on Widget Interaction Behavior. 1-8 - Rubab Zahra Batool, Ali Hassan

, Rizwan Ahmad
, Waqas Ahmed:
Improvement of QoS through Relay Selection For Hybrid SWIPT Protocol. 1-5 - Grace Hanusha Talakala, Jyotsna Bapat:

Detecting Spoofing Attacks in Zigbee using Device Fingerprinting. 1-2 - Nívia Cruz Quental:

UPub: Enabling Mobility Management for Publish/Subscribe Systems in the Edge. 1-2 - Aarti Singh, Neal Patwari:

Range-based Collision Prediction for Dynamic Motion. 1-6 - Alexandre Heideker

, Carlos Kamienski
:
Towards a Network Queuing Assessment for Elasticity Management of Virtualized Services. 1-6 - Yoshihiro Taniguchi, Takumi Miyoshi, Taku Yamazaki, Takuya Asaka:

How Users Behave on WPT-motivated MANET: Qualitative Analysis of Users Cooperation. 1-4 - Sathia Chandrane Sundararaju, Mohanraja Balasubramaniam, Debabrata Das

:
Efficient Random Access Protocol for Multi SIM Multi Standby Devices in 5G and B5G Networks. 1-2 - Silvia Mignardi

, Pablo Miguel Pulcinella, Roberto Verdone:
The Role of Ground-to-Air Handovers in B5G UAV-Aided Mobile Networks. 1-2 - Chihiro Kawata, Takamasa Kitanouma, Yasuhisa Takizawa:

Study on Accuracy for Self-Organizing Localization with Multiplexed Topology. 1-2 - Mohamed Rahouti, Kaiqi Xiong

, Yufeng Xin, Nasir Ghani:
A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. 1-2 - Tim Farnham, Simon Jones, Adnan Aijaz, Yichao Jin, Ioannis Mavromatis

, Usman Raza, Anthony Portelli, Aleksandar Stanoev, Mahesh Sooriyabandara:
UMBRELLA Collaborative Robotics Testbed and IoT Platform. 1-7 - Hikotoshi Nakazato, Seisuke Arai, Masahiro Miyazaka:

Tracking Unspecified Detected Targets By Propagating Instantly Created Self-Organizing Maps. 1-2 - Suchet Sapre, Khondkar R. Islam, Pouyan Ahmadi:

A Comprehensive Data Sampling Analysis Applied to the Classification of Rare IoT Network Intrusion Types. 1-2 - Seungho Lee, Si Young Jang, Soon J. Hyun, Dongman Lee:

DQN-based Coverage Maximization for Mobile Video Camera Networks. 1-2 - Johann Márquez-Barja

, Seilendria A. Hadiwardoyo, Vasilis Maglogiannis
, Dries Naudts, Ingrid Moerman, Peter Hellinckx
, Sofie Verbrugge, Simon Delaere, Wim Vandenberghe, Eric Kenis, Maria Chiara Campodonico, Rakshith Kusumakar, Job Meines, Joost Vandenbossche:
Enabling cross-border tele-operated transport in the 5G Era: The 5G Blueprint approach. 1-4 - Idris Zakariyya

, M. Omar Al-Kadri
, Harsha K. Kalutarage
:
Resource Efficient Boosting Method for IoT Security Monitoring. 1-6 - Raiful Hasan, Ragib Hasan

, Tanveer Islam:
InSight: A Bluetooth Beacon-based Ad-hoc Emergency Alert System for Smart Cities. 1-6 - Nina Slamnik-Krijestorac, Johann M. Márquez-Barja

:
Unraveling Edge-based in-vehicle infotainment using the Smart Highway testbed. 1-4 - Pankaj Thorat, Niraj Kumar Dubey, Kunal Khetan, Rajesh Challa:

SDN-based Predictive Alarm Manager for Security Attacks Detection at the IoT Gateways. 1-2 - Patrick Seeling, Frank H. P. Fitzek

:
Anticipatory Networking: Negative Latency for Ubiquitous Computing. 1-4 - Andreas Ingo Grohmann, David Nophut, Marek Sobe, Adrian Bretschneider Perez, Frank H. P. Fitzek

:
Interference resilience of Thread: A practical performance evaluation. 1-4 - Haitham Afifi, Arunselvan Ramaswamy

, Holger Karl:
A Reinforcement Learning QoI/QoS-Aware Approach in Acoustic Sensor Networks. 1-6 - Shingo Tomida, Keiichi Mizutani, Hiroshi Harada

:
Radio Protection Area Estimation Methods for Spectrum Sharing-based 5G System. 1-4 - Loïc Jouans, Aline Carneiro Viana

, Nadjib Achir, Anne Fladenmuller:
Associating the Randomized Bluetooth MAC Addresses of a Device. 1-6 - Erik Lamers, Raoul Dijksman Mensenkamp, Arjan van der Vegt, Mayur Sarode, Cees de Laat:

Securing Home Wi-Fi with WPA3 Personal. 1-8 - Safi Shams Muhtasimul Hoque

, Chao-Yu Chen, Alphan Sahin:
A Wideband Index Modulation with Circularly-Shifted Chirps. 1-6 - Lei Liu, Hamed Mosavat-Jahromi, Lin Cai

, David Kidston:
Hierarchical Agglomerative Clustering and LSTM-based Load Prediction for Dynamic Spectrum Allocation. 1-6 - Vincenzo Rubano, Fabio Vitali:

Making accessibility accessible: strategy and tools. 1-6 - Federica Amato, Marianna Di Gregorio, Clara Monaco, Monica Sebillo, Genoveffa Tortora, Giuliana Vitiello

:
Socially Assistive Robotics combined with Artificial Intelligence for ADHD. 1-6 - Harish Chintakunta, Janar Kahr, Luis Gabriel Jaimes:

A Vehicular Crowd-sensing Incentive Mechanism for Temporal Coverage. 1-8 - Ryo Yaegashi, Daisuke Hisano, Yu Nakayama:

Light-Weight DDoS Mitigation at Network Edge with Limited Resources. 1-6 - Nívia Cruz Quental:

UPub Demo: Enabling Mobility Management for Publish/Subscribe Systems in the Edge. 1-2 - Shalitha Wijethilaka, Madhusanka Liyanage

:
Realizing Internet of Things with Network Slicing: Opportunities and Challenges. 1-6 - Fabricio A. Toasa, Luis Tello-Oquendo, Carlos R. Peñafiel-Ojeda

, Giovanny Cuzco:
Experimental Demonstration for Indoor Localization Based on AoA of Bluetooth 5.1 Using Software Defined Radio. 1-4 - Tim Grube, Rolf Egert, Max Mühlhäuser, Jörg Daubert:

The Cost of Path Information: Routing in Anonymous Communication. 1-6 - Badr Eddine Boukari, Akshaya Ravi

, Mounira Msahli:
Machine Learning Detection for SMiShing Frauds. 1-2 - Nishant Gupta

, Deepak Mishra
, Satyam Agarwal:
3D-Trajectory Design for Outage Minimization in UAV-Assisted 5G Communication System. 1-6 - Ravikant Saini, Deepak Mishra

, Venugopalachary Kotha
:
Power Allocation and Relay Placement for Secrecy Outage Minimization over DF Relayed System. 1-4 - Wei Sun

:
Distributed Optimal Scheduling in UAV Swarm Network. 1-4 - Ramesh Chandran, Amarpreet Singh Sethi:

A Novel Link Adaptation Technique for LTE based Machine Type Communication. 1-2 - Swaraj Kumar, Satya Kumar Vankayala, Biswapratap Singh Sahoo, Seungil Yoon:

Continual Learning-Based Channel Estimation for 5G Millimeter-Wave Systems. 1-6 - S. Saibharath, Sudeepta Mishra, Chittaranjan Hota

:
QoS Driven Task Offloading and Resource Allocation at Edge Servers in RAN Slicing. 1-4 - Satyaki Roy, Ronojoy Dutta, Nirnay Ghosh, Preetam Ghosh

:
Leveraging Periodicity to Improve Quality of Service in Mobile Software Defined Wireless Sensor Networks. 1-2 - Mohammad Nazmus Sadat

, Erwin Vargas-Alfonso
, Rui Dai, Ziqian Huang
, Yiling Fu, Sunmeng Lin:
QoE-Driven Cross-Layer Design for Video Communication over Software-Defined Radio. 1-9 - Badreddine Yacine Yacheur

, Toufik Ahmed, Mohamed Mosbah
:
Implementation and Assessment of IEEE 802.11BD for Improved Road Safety. 1-6 - Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin

, David C. Schwebel, Ragib Hasan
:
StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians. 1-2 - Raushan Raj, Adita Kulkarni, Anand Seetharam, Arti Ramesh:

Wireless Channel Quality Prediction using Sparse Gaussian Conditional Random Fields. 1-6 - Marcelo S. Alencar:

Traffic Congestion in Social Networks Caused by Epidemic Interference. 1-4 - Ehab M. El-Guindy, Karim G. Seddik

, Amr A. El-Sherif, Tamer A. ElBatt:
Feedback-Based Access Schemes in CR Networks: A Reinforcement Learning Approach. 1-6 - Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:

Multi-Type Anomaly Detection Based on Raw Network Traffic. 1-2 - Takayuki Nishio, Yoshiaki Inoue, Yu Nakayama, Marie Katsurai:

Joint Computation Offloading and Sampling Interval Optimization for Accuracy-Guaranteed Surveillance. 1-6 - Pascal Urien

:
Innovative TLS 1.3 Identity Module for Trusted IoT Device. 1-4 - Xiaosa Xu, Xiang Wu, Wen-Kang Jia:

On the Lawful Intercept Access Point Placement Problem in Hybrid Software-Defined Networks. 1-6 - Roberto Torre Arranz, Robert-Steve Schmoll, Florian Kemser, Hani Salah, Ievgenii Tsokalo, Frank H. P. Fitzek

:
Benchmarking Live Migration Performance Under Stressed Conditions. 1-2 - Ilko Hoffmann, Nils Jensen, Anamaria Cristescu:

Decentralized Governance for Digital Platforms - Architecture Proposal for the Mobility Market to enhance Data Privacy and Market Diversity. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














